Our comprehensive audit process gives you a comprehensive view of your security posture
The audit process begins with script execution as well as a manual collection of your current configuration settings.
We then continue by conducting a comparison of the script output or the manually collected settings against established CPTPL baseline settings.
After the audit is complete we provide a safe/unsafe status check with detailed descriptions of unsafe findings and discuss those findings with administrators to better understand the client’s environment.
At the conclusion of the secure configuration audit, our team of experts provides a final report with detailed findings, a risk rating, and suggestions for mitigating risk.